Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata Dec 2023

Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata

Graduate Theses and Dissertations

Magnetic Resonance Imaging (MRI) is typically a slow process because of its sequential data acquisition. To speed up this process, MR acquisition is often accelerated by undersampling k-space signals and solving an ill-posed problem through a constrained optimization process. Image reconstruction from under-sampled data is posed as an inverse problem in traditional model-based learning paradigms. While traditional methods use image priors as constraints, modern deep learning methods use supervised learning with ground truth images to learn image features and priors. However, in some cases, ground truth images are not available, making supervised learning impractical. Recent data-centric learning frameworks such as …


Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha Aug 2023

Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha

Electronic Thesis and Dissertation Repository

Internet traffic forecast is a crucial component for the proactive management of self-organizing networks (SON) to ensure better Quality of Service (QoS) and Quality of Experience (QoE). Given the volatile and random nature of traffic data, this forecasting influences strategic development and investment decisions in the Internet Service Provider (ISP) industry. Modern machine learning algorithms have shown potential in dealing with complex Internet traffic prediction tasks, yet challenges persist. This thesis systematically explores these issues over five empirical studies conducted in the past three years, focusing on four key research questions: How do outlier data samples impact prediction accuracy for …


Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar Aug 2023

Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar

Electronic Thesis and Dissertation Repository

The ever-increasing frequency of occurrence and sophistication of DDoS attacks pose a serious threat to network security. Accurate classification of DDoS attacks with efficiency is crucial in order to develop effective defense mechanisms. In this thesis, we propose a novel approach for DDoS classification using the CatBoost algorithm, on CICDDoS2019, a benchmark dataset containing 12 variations of DDoS attacks and legitimate traffic using real-world traffic traces. With a developed ensemble feature selection method and feature engineering, our model proves to be a good fit for DDoS attack type prediction. Our experimental results demonstrate that our proposed approach achieves high classification …


Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi Aug 2023

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi

All Theses

The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …


Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements May 2023

Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements

All Dissertations

Adversarial deep learning is the field of study which analyzes deep learning in the presence of adversarial entities. This entails understanding the capabilities, objectives, and attack scenarios available to the adversary to develop defensive mechanisms and avenues of robustness available to the benign parties. Understanding this facet of deep learning helps us improve the safety of the deep learning systems against external threats from adversaries. However, of equal importance, this perspective also helps the industry understand and respond to critical failures in the technology. The expectation of future success has driven significant interest in developing this technology broadly. Adversarial deep …


Improving Inference Speed Of Perception Systems In Autonomous Unmanned Ground Vehicles, Bradley Selee May 2023

Improving Inference Speed Of Perception Systems In Autonomous Unmanned Ground Vehicles, Bradley Selee

All Theses

Autonomous vehicle (AV) development has become one of the largest research challenges in businesses and research institutions. While much research has been done, autonomous driving still requires extensive amounts of research due to its immense, multi-factorial difficulty. Autonomous vehicles rely on many complex systems to function, make accurate decisions, and, above all, provide maximum safety. One of the most crucial components of autonomous driving is the perception system.

The perception system allows the vehicle to identify its surroundings and make accurate, but safe, decisions through the use of computer vision techniques like object detection, image segmentation, and path planning. Due …


Deep Learning Methods For Prediction Of And Escape From Protein Recognition, Bowen Dai Mar 2023

Deep Learning Methods For Prediction Of And Escape From Protein Recognition, Bowen Dai

Dartmouth College Ph.D Dissertations

Protein interactions drive diverse processes essential to living organisms, and thus numerous biomedical applications center on understanding, predicting, and designing how proteins recognize their partners. While unfortunately the number of interactions of interest still vastly exceeds the capabilities of experimental determination methods, computational methods promise to fill the gap. My thesis pursues the development and application of computational methods for several protein interaction prediction and design tasks. First, to improve protein-glycan interaction specificity prediction, I developed GlyBERT, which learns biologically relevant glycan representations encapsulating the components most important for glycan recognition within their structures. GlyBERT encodes glycans with a branched …


A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose Jan 2023

A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose

Theses and Dissertations--Electrical and Computer Engineering

As deep neural network (DNN) models increase significantly in complexity and size, it has become important to increase the computing capability of specialized hardware architectures typically used for DNN processing. The major linear operations of DNNs, which comprise the fully connected and convolution layers, are commonly converted into general matrix-matrix multiplication (GEMM) operations for acceleration. Specialized GEMM accelerators are typically employed to implement these GEMM operations, where a GEMM operation is decomposed into multiple vector-dot-product operations that run in parallel. A common challenge that arises in modern DNNs is the mismatch between the matrices used for GEMM operations and the …


Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina Jan 2023

Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina

Theses and Dissertations--Computer Science

The incidence of computer network intrusions has significantly increased over the last decade, partially attributed to a thriving underground cyber-crime economy and the widespread availability of advanced tools for launching such attacks. To counter these attacks, researchers in both academia and industry have turned to machine learning (ML) techniques to develop Intrusion Detection Systems (IDSes) for computer networks. However, many of the datasets use to train ML classifiers for detecting intrusions are not balanced, with some classes having fewer samples than others. This can result in ML classifiers producing suboptimal results. In this dissertation, we address this issue and present …


Spatio-Temporal Deep Learning Approaches For Addressing Track Association Problem Using Automatic Identification System (Ais) Data, Md Asif Bin Syed Jan 2023

Spatio-Temporal Deep Learning Approaches For Addressing Track Association Problem Using Automatic Identification System (Ais) Data, Md Asif Bin Syed

Graduate Theses, Dissertations, and Problem Reports

In the realm of marine surveillance, track association constitutes a pivotal yet challenging task, involving the identification and tracking of unlabelled vessel trajectories. The need for accurate data association algorithms stems from the urge to spot unusual vessel movements or threat detection. These algorithms link sequential observations containing location and motion information to specific moving objects, helping to build their real-time trajectories. These threat detection algorithms will be useful when a vessel attempts to conceal its identity. The algorithm can then identify and track the specific vessel from its incoming signal. The data for this study is sourced from the …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …